1
0
Fork 0
mirror of https://github.com/ansible-collections/community.general.git synced 2024-09-14 20:13:21 +02:00

use double-quotes in postgresql commands (fix bug with "-")

This commit is contained in:
Félix Sipma 2013-01-04 12:48:29 +01:00
parent caee51e90e
commit cd7fe9875c
2 changed files with 14 additions and 14 deletions

View file

@ -78,7 +78,7 @@ else:
# #
def set_owner(cursor, db, owner): def set_owner(cursor, db, owner):
query = "ALTER DATABASE %s OWNER TO %s" % (db, owner) query = "ALTER DATABASE \"%s\" OWNER TO \"%s\"" % (db, owner)
cursor.execute(query) cursor.execute(query)
return True return True
@ -95,7 +95,7 @@ def db_exists(cursor, db):
def db_delete(cursor, db): def db_delete(cursor, db):
if db_exists(cursor, db): if db_exists(cursor, db):
query = "DROP DATABASE %s" % db query = "DROP DATABASE \"%s\"" % db
cursor.execute(query) cursor.execute(query)
return True return True
else: else:
@ -104,9 +104,9 @@ def db_delete(cursor, db):
def db_create(cursor, db, owner, template, encoding): def db_create(cursor, db, owner, template, encoding):
if not db_exists(cursor, db): if not db_exists(cursor, db):
if owner: if owner:
owner = " OWNER %s" % owner owner = " OWNER \"%s\"" % owner
if template: if template:
template = " TEMPLATE %s" % template template = " TEMPLATE \"%s\"" % template
if encoding: if encoding:
encoding = " ENCODING '%s'" % encoding encoding = " ENCODING '%s'" % encoding
query = "CREATE DATABASE %s%s%s%s" % (db, owner, template, encoding) query = "CREATE DATABASE %s%s%s%s" % (db, owner, template, encoding)

View file

@ -136,7 +136,7 @@ def user_exists(cursor, user):
def user_add(cursor, user, password, role_attr_flags): def user_add(cursor, user, password, role_attr_flags):
"""Create a new user with write access to the database""" """Create a new user with write access to the database"""
query = "CREATE USER %(user)s with PASSWORD '%(password)s' %(role_attr_flags)s" query = "CREATE USER \"%(user)s\" with PASSWORD '%(password)s' %(role_attr_flags)s"
cursor.execute(query % {"user": user, "password": password, "role_attr_flags": role_attr_flags}) cursor.execute(query % {"user": user, "password": password, "role_attr_flags": role_attr_flags})
return True return True
@ -154,11 +154,11 @@ def user_alter(cursor, user, password, role_attr_flags):
if password is not None: if password is not None:
# Update the role attributes, including password. # Update the role attributes, including password.
alter = "ALTER USER %(user)s WITH PASSWORD '%(password)s' %(role_attr_flags)s" alter = "ALTER USER \"%(user)s\" WITH PASSWORD '%(password)s' %(role_attr_flags)s"
cursor.execute(alter % {"user": user, "password": password, "role_attr_flags": role_attr_flags}) cursor.execute(alter % {"user": user, "password": password, "role_attr_flags": role_attr_flags})
else: else:
# Update the role attributes, excluding password. # Update the role attributes, excluding password.
alter = "ALTER USER %(user)s WITH %(role_attr_flags)s" alter = "ALTER USER \"%(user)s\" WITH %(role_attr_flags)s"
cursor.execute(alter % {"user": user, "role_attr_flags": role_attr_flags}) cursor.execute(alter % {"user": user, "role_attr_flags": role_attr_flags})
# Grab new role attributes. # Grab new role attributes.
cursor.execute(select, {"user": user}) cursor.execute(select, {"user": user})
@ -175,7 +175,7 @@ def user_delete(cursor, user):
"""Try to remove a user. Returns True if successful otherwise False""" """Try to remove a user. Returns True if successful otherwise False"""
cursor.execute("SAVEPOINT ansible_pgsql_user_delete") cursor.execute("SAVEPOINT ansible_pgsql_user_delete")
try: try:
cursor.execute("DROP USER %s" % user) cursor.execute("DROP USER \"%s\"" % user)
except: except:
cursor.execute("ROLLBACK TO SAVEPOINT ansible_pgsql_user_delete") cursor.execute("ROLLBACK TO SAVEPOINT ansible_pgsql_user_delete")
cursor.execute("RELEASE SAVEPOINT ansible_pgsql_user_delete") cursor.execute("RELEASE SAVEPOINT ansible_pgsql_user_delete")
@ -185,7 +185,7 @@ def user_delete(cursor, user):
return True return True
def has_table_privilege(cursor, user, table, priv): def has_table_privilege(cursor, user, table, priv):
query = 'SELECT has_table_privilege(%s, %s, %s)' query = 'SELECT has_table_privilege(\'%s\', \'%s\', \'%s\')'
cursor.execute(query, (user, table, priv)) cursor.execute(query, (user, table, priv))
return cursor.fetchone()[0] return cursor.fetchone()[0]
@ -202,14 +202,14 @@ def get_table_privileges(cursor, user, table):
def grant_table_privilege(cursor, user, table, priv): def grant_table_privilege(cursor, user, table, priv):
prev_priv = get_table_privileges(cursor, user, table) prev_priv = get_table_privileges(cursor, user, table)
query = 'GRANT %s ON TABLE %s TO %s' % (priv, table, user) query = 'GRANT %s ON TABLE \"%s\" TO \"%s\"' % (priv, table, user)
cursor.execute(query) cursor.execute(query)
curr_priv = get_table_privileges(cursor, user, table) curr_priv = get_table_privileges(cursor, user, table)
return len(curr_priv) > len(prev_priv) return len(curr_priv) > len(prev_priv)
def revoke_table_privilege(cursor, user, table, priv): def revoke_table_privilege(cursor, user, table, priv):
prev_priv = get_table_privileges(cursor, user, table) prev_priv = get_table_privileges(cursor, user, table)
query = 'REVOKE %s ON TABLE %s FROM %s' % (priv, table, user) query = 'REVOKE %s ON TABLE \"%s\" FROM \"%s\"' % (priv, table, user)
cursor.execute(query) cursor.execute(query)
curr_priv = get_table_privileges(cursor, user, table) curr_priv = get_table_privileges(cursor, user, table)
return len(curr_priv) < len(prev_priv) return len(curr_priv) < len(prev_priv)
@ -235,20 +235,20 @@ def get_database_privileges(cursor, user, db):
return o return o
def has_database_privilege(cursor, user, db, priv): def has_database_privilege(cursor, user, db, priv):
query = 'SELECT has_database_privilege(%s, %s, %s)' query = 'SELECT has_database_privilege(\'%s\', \'%s\', \'%s\')'
cursor.execute(query, (user, db, priv)) cursor.execute(query, (user, db, priv))
return cursor.fetchone()[0] return cursor.fetchone()[0]
def grant_database_privilege(cursor, user, db, priv): def grant_database_privilege(cursor, user, db, priv):
prev_priv = get_database_privileges(cursor, user, db) prev_priv = get_database_privileges(cursor, user, db)
query = 'GRANT %s ON DATABASE %s TO %s' % (priv, db, user) query = 'GRANT %s ON DATABASE \"%s\" TO \"%s\"' % (priv, db, user)
cursor.execute(query) cursor.execute(query)
curr_priv = get_database_privileges(cursor, user, db) curr_priv = get_database_privileges(cursor, user, db)
return len(curr_priv) > len(prev_priv) return len(curr_priv) > len(prev_priv)
def revoke_database_privilege(cursor, user, db, priv): def revoke_database_privilege(cursor, user, db, priv):
prev_priv = get_database_privileges(cursor, user, db) prev_priv = get_database_privileges(cursor, user, db)
query = 'REVOKE %s ON DATABASE %s FROM %s' % (priv, db, user) query = 'REVOKE %s ON DATABASE \"%s\" FROM \"%s\"' % (priv, db, user)
cursor.execute(query) cursor.execute(query)
curr_priv = get_database_privileges(cursor, user, db) curr_priv = get_database_privileges(cursor, user, db)
return len(curr_priv) < len(prev_priv) return len(curr_priv) < len(prev_priv)